Search Results - (( programming using drops algorithm ) OR ( java application window algorithm ))
Search alternatives:
- application window »
- java application »
- window algorithm »
- using drops »
-
1
Intelligent examination timetabling system using hybrid intelligent water drops algorithm
Published 2015Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Intelligent Examination Timetabling System Using Hybrid Intelligent Water Drops Algorithm
Published 2024Proceedings Paper -
3
Application-Programming Interface (API) for Song Recognition Systems
Published 2024“…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
Article -
4
Congestion management based optimization technique using bee colony
Published 2023“…Tests conducted on the IEEE 30-Bus Reliability Test System for performance assessment revealed that the proposed bee algorithm technique is better than evolutionary programming technique in addressing this problem. �2010 IEEE.…”
Conference Paper -
5
Enhanced Intelligent Water Drops Algorithm for University Examination Timetabling Problems
Published 2024“…This thesis presents an investigation of using the Intelligent Water Drops (IWD) algorithm to construct and produce good quality solutions for the UETP. …”
thesis::doctoral thesis -
6
OPTIMAL CABLE SELECTION IN RADIAL DISTRIBUTION NETWORKS CONSIDERING PLANNER'S DEFINED VOLTAGE DROP LIMIT
Published 2002“…The resource of the cable inventory is also responsible for optimal selection of the cable. By using this proposed computer algorithm and program an example is solved successfully that is presented in the results.…”
Get full text
Get full text
Conference or Workshop Item -
7
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…Face recognition is a technique to identify an individual by his/her physical characteristic and has been of interest to a growing number of researchers due to its applications on security. Several different algorithms have been proposed for computer recognition of human faces. …”
Get full text
Get full text
Thesis -
8
-
9
Simulation of single and dual layered rapid pressure swing adsorption
Published 2013“…It is also found that the oxygen product purity increases by almost 20% when the first layer is packed with Zeolite AgLiX and Zeolite 5A in the second layer. Higher pressure drop across the bed is induced when particles of smaller pressure drop are used in the first layer and particles of larger pressure drop are used in the second layer, hence leading to better separation. …”
Get full text
Get full text
Thesis -
10
Modelling and optimisation of blood glucose control for type 1 diabetes using multi-parametric programming and model-based predictive control (mp-MPC) / Associate Professor Dr Ayub...
Published 2014“…In doing so, Multi-Parametric Programming technique is used to develop the computer algorithm; whereas Model-Based Predictive Control (MPC) is adopted for the design of the controller. …”
Get full text
Get full text
Monograph -
11
-
12
-
13
Experimental implementation controlled SPWM inverter based harmony search algorithm
Published 2023Article -
14
Performance evaluation of corner effect in UMTS / Nurzaliza Ghazali
Published 2009Get full text
Get full text
Thesis -
15
Comparison of algorithm Support Vector Machine and C4.5 for identification of pests and diseases in chili plants
Published 2019“…The use of data mining algorithms is expected to help in the identification of pests and diseases in chili plants. …”
Get full text
Get full text
Conference or Workshop Item -
16
-
17
Optimal Charging Strategy for Plug-in Hybrid Electric Vehicle Using Evolutionary Algorithm
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Design and Development of Artificial Intelligence (Al)-Based Desicion Support System For Manufacturing Applications
Published 2016“…In the image processing stage, a flaw map, as described in the previous report, is used. Six welding defect types, namely Porosity{POR), Drop Through{DT), and Lack of Fusion{LOF), Lack of Penetration{LOP), Linear Indication{LI) and Undercut{UC), have been investigated. …”
Get full text
Monograph -
19
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
20
Effects of Authentication of Users in Mobile Internet Protocol Version 6
Published 2004“…In this thesis, a user authentication program is modeled and simulated using Network simulator2 (NS2). …”
Get full text
Get full text
Thesis
